Infrastructure Security SupportWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Infrastructure Security Support returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Virtualization
 •   Data Center Management
 •   Security Monitoring
 •   Application Security
 •   Enterprise Systems Management
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Best Infrastructure Security
 •   Cycles Infrastructure Security Support
 •   Demo Infrastructure Security Support
 •   Demonstrations Infrastructure Security
 •   Infrastructure Operating
 •   Infrastructure Security Portal
 •   Infrastructure Security Support Faqs
 •   Infrastructure Security Support Pay
 •   Reseller Infrastructure Security Support
 •   Tracking Infrastructure
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Tripwire Enterprise and Tripwire Log Center: Integrated for Unparalleled Security by Tripwire, Inc.

February 24, 2011 - (Free Research)
Tools for monitoring and protecting the IT infrastructure have evolved into powerful, yet isolated, islands of defense. Because modern threats can take advantage of this isolation, IT security needs a single, comprehensive view of infrastructure security. 
(DATA SHEET) READ ABSTRACT |

Secure Wireless Made Easy -- Selecting a Next-Generation Solution for Pervasive WLAN Implementations by SonicWALL

July 06, 2009 - (Free Research)
This paper examines the characteristics of a next-generation solution that helps alleviate the prevailing issues and challenges associated with today's WLAN implementations. The emergence of products that conform to related criteria holds the key to enabling enterprises to fully realize the important benefits that wireless technology has to offer. 
(WHITE PAPER) READ ABSTRACT |

From Secure Virtualization to Secure Private Cloud by VMware, Inc.

February 08, 2012 - (Free Research)
The way in which enterprises provision and deliver security services must evolve in order to secure private cloud computing.  This paper explores the subject of security as enterprises move beyond virtualizing their data centers to build private cloud-computing infrastructures and outlines the foundational capabilities that are required. 
(WHITE PAPER) READ ABSTRACT |

IT Decision Checklist: Virtual Desktop Infrastructure Security by Astaro

February 15, 2011 - (Free Research)
VDI presents enterprises with dynamic opportunities to improve security. Check out this e-guide to learn what those are and receive guidance on evaluating VDI security products. 
(EGUIDE) READ ABSTRACT |

IT Decision Checklist: Virtual Desktop Infrastructure Security by Trend Micro

November 02, 2010 - (Free Research)
Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products. 
(EGUIDE) READ ABSTRACT |

A practical guide to keeping your virtual data centre safe by Sophos UK

June 07, 2010 - (Free Research)
This whitepaper will focus on the best practices for the protection of virtual servers running in the data centre. 
(WHITE PAPER) READ ABSTRACT |

Protecting the Dynamic Datacenter by Trend Micro

August 01, 2009 - (Free Research)
Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

QUOCIRCA BRIEFING - Remote IT Management by NTR Global

December 2008 - (Free Research)
IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on. 
(WHITE PAPER) READ ABSTRACT |

When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure by Trend Micro, Inc.

July 2010 - (Free Research)
Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

The Path to Securing Enterprise Desktops: From Personal Computers to Personalized Computing by VMware, Inc.

October 2008 - (Free Research)
This IDC white paper considers desktop virtualization, specifically as made available by VMware's VDI and ACE; it also considers the benefits and limitations of these technologies and best use cases, exemplified through user case studies. 
(WHITE PAPER) READ ABSTRACT |

Expert tips: Preparing for private cloud construction by ASG Software Solutions

August 2011 - (Free Research)
Private clouds offer many of the advantages of public cloud services but without the security concerns and compliance issues. Find out the cost advantages private cloud has over traditional IT deployments, and discover key elements you need to support a private cloud in your IT infrastructure. 
(EGUIDE) READ ABSTRACT |

Access Control in Virtual Environments by FoxT

June 2008 - (Free Research)
The growth in use of virtual servers is heralded by many as a positive development because it is seen to save companies money and resources. 
(WHITE PAPER) READ ABSTRACT |

Strategy Guide to Converged Infrastructure in the Branch Office by HP & Intel®

July 2011 - (Free Research)
This strategy guide will help IT decision-makers understand how converged infrastructure will facilitate such essential tasks as network support, stretching data storage resources, automating operations and streamlining systems management. 
(WHITE PAPER) READ ABSTRACT |

Channel Edge Reseller Program by Webroot

August 2013 - (Free Research)
This brief white paper explains why organizations should choose an endpoint security solution from Webroot in order to provide their customers with the best security possible to deal with increased threats. 
(WHITE PAPER) READ ABSTRACT |

Close Encounters of the Third Kind by IBM

March 2011 - (Free Research)
This paper presents results of research performed by IBM into client-side JavaScript vulnerabilities using a JavaScript Security Analyzer (JSA), which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process. 
(WHITE PAPER) READ ABSTRACT |

Physical Security in Mission Critical Facilities by APC by Schneider Electric

February 2009 - (Free Research)
This paper presents an overview of the principles of personnel identification and describes the basic elements and procedures used in security systems. 
(WHITE PAPER) READ ABSTRACT |

CCNA v2.0 Review: Critical Concepts of the 640-802 CCNA Exam by Global Knowledge

October 2008 - (Free Research)
This paper helps students understand the types of information required to pass the new 640-802 CCNA composite exam by providing a convenient review of the exam's critical concepts. 
(WHITE PAPER) READ ABSTRACT |

Security for Cloud Computing: 10 Steps to Ensure Success by IBM

December 2012 - (Free Research)
This guide provides an essential reference for cloud security, offering information on the current cloud security landscape and assessing potential concerns. 
(WHITE PAPER) READ ABSTRACT |

Developing an Effective Corporate Mobile Policy by BlackBerry

June 2008 - (Free Research)
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing. 
(WHITE PAPER) READ ABSTRACT |

VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking by F5 Networks

October 2008 - (Free Research)
This White Paper details how the F5 BIG-IP LTM works with VMware to provide truly virtualized Application Delivery Networking. 
(WHITE PAPER) READ ABSTRACT |

Determining Total Cost of Ownership for Data Center and Network Room Infrastructure by APC by Schneider Electric

February 2005 - (Free Research)
This white paper describes an improved method for measuring TCO for data center and network room physical infrastructure, and provides examples on how to relate these costs to the overall IT infrastructure and evaluate cost control strategies. 
(WHITE PAPER) READ ABSTRACT |

Unified Provisioning Manager to Deploy and Implement UC by Cisco Systems, Inc.

February 2012 - (Free Research)
Discover how a unified communications management solution can help you facilitate easy collaboration every time, from any workspace. 
(DATA SHEET) READ ABSTRACT |

Cisco Cloud Security Accelerates Cloud Adoption by Cisco Systems, Inc.

December 2011 - (Free Research)
Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption. 
(WHITE PAPER) READ ABSTRACT |

Cisco Cloud Security Accelerates Cloud Adoption by Cisco Systems, Inc.

June 2012 - (Free Research)
Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Virtualization E-book, Chapter 6: How Virtual Infrastructures Change Security by SearchServerVirtualization

October 2009 - (Free Research)
Protecting the virtual data center doesn't need to be any more difficult than protecting a physical network. The key is to remain vigilant. In this chapter, you'll learn how to mitigate potential security risks to your resource pool and virtual machines without over-allocating administration. 
(EBOOK) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts